Encryption details¶
This document - provided by SysEleven - describes the server-side encryption scheme implemented by Nextcloud’s default encryption module. This includes:
- the encryption and signature of files with a master key.
- the encryption and signature of files with a public sharing key.
- the encryption and signature of files with a recovery key.
- the encryption and signature of files with a user key.
These conventions apply throughout this document:
- Given file paths in this document are relative to the Nextcloud data directory that can be retrieved as
datadirectory
from theconfig.php
. - Placeholders are denoted as
$variable
. The variable has to be replaced with the appropriate information. - Static strings are denoted as
"some string"
. - The concatenation of strings is denoted as
$variable."some string"
.
Note
However, files that have been encrypted in Nextcloud versions 15 and lower may have slightly different structures.
Key type: master key¶
This is the default encryption mode in Nextcloud. With master key encryption enabled there is one central key that is used to secure the files handled by Nextcloud. The master key is protected by a password that can be generated by the server administrator. The advantage of the master key encryption is that the encryption is transparent to the users but has the disadvantage that the server administrator is able to decrypt user files without knowing any user password.
Key type: public sharing key¶
The public sharing key is used to secure files that have been publicly shared. The public sharing key is protected by a password that can be generated by the server administrator. The advantage of the public sharing key is that it is independent of the selected encryption mode so that Nextcloud is able to provide publicly shared files to outside parties.
Key type: recovery key¶
The recovery key is used to provide a restore mechanism in cases where the user key encryption is enabled, where the administrator has enabled the recovery key feature and the user has opted into using the recovery key feature. The recovery key can then be used to restore files when users have lost their passwords. The recovery key is protected by a recovery password that the server administrator should store securely. The advantage of the recovery key is that files can be recovered but has the disadvantage that the server administrator is able to decrypt user files without knowing any user password.
Key type: user key¶
User key encryption needs to be explicitly activated by calling ./occ encryption:disable-master-key
. In older versions of Nextcloud this had been enabled by default.
With user key encryption enabled all users have their own user keys that are used to secure the files handled by Nextcloud. The user keys are protected by the user passwords. The advantage is that the server administrator is not able to decrypt user files without knowing any user password - unless the file is publicly shared or a recovery key is defined - but has the disadvantage that files are permanently lost if the users forget their user passwords - unless the files are (publicly) shared or a recovery key is defined.
Note
This method cannot be used with SAML authentication, because Nextcloud does not get a hold of any credentials whatsoever and therefore cannot use any users’ passwords for encryption.
File type: public key file¶
Public key files contain RSA public keys that are used to encrypt/seal the share key files.
File format¶
Public key files are stored in PEM format.
File locations¶
The locations of public key files depend on their key type:
- master public key:
"files_encryption/OC_DEFAULT_MODULE/master_".$random.".publicKey"
- public sharing public key:
"files_encryption/OC_DEFAULT_MODULE/pubShare_".$random.".publicKey"
- recovery public key:
"files_encryption/OC_DEFAULT_MODULE/recoveryKey_".$random.".publicKey"
- user public key:
$username."/files_encryption/OC_DEFAULT_MODULE/".$username.".publicKey"
File type: private key file¶
Private key files contain RSA private keys that are used to decrypt/unseal the share key files. The RSA private key is encrypted and signed with a password and stored in a format that is specific to the Nextcloud encryption module.
File format¶
The RSA private key that is represented in PEM format is encrypted and Base64 encoded (denoted as $encryption
). For the encryption an initialization vector of 16 bytes is selected (denoted as $iv
). Furthermore a hexadecimally encoded message authentication code of 64 bytes is calculated (denoted as $signature
). The resulting file contains:
"HBEGIN:cipher:AES-256-CTR:keyFormat:hash:HEND".
$encrypted."00iv00".$iv."00sig00".$signature."xxx"
File locations¶
The locations of private key files depend on their key type:
- master private key:
"files_encryption/OC_DEFAULT_MODULE/master_".$random.".privateKey"
- public sharing private key:
"files_encryption/OC_DEFAULT_MODULE/pubShare_".$random.".privateKey"
- recovery private key:
"files_encryption/OC_DEFAULT_MODULE/recoveryKey_".$random.".privateKey"
- user private key:
$username."/files_encryption/OC_DEFAULT_MODULE/".$username.".privateKey"
File type: file key file¶
File key files contain symmetric keys used to encrypt the actual files. The file keys consist of 32 random bytes and are encrypted/sealed with the envelope keys stored in the share key files.
File format¶
The file keys are stored in binary format.
File locations¶
The locations of the file key files depend on the type of the encrypted file:
- regular file:
$username."/files_encryption/keys/files/".$filename."/OC_DEFAULT_MODULE/fileKey"
- version file: version files use the same location for the file key file as their regular file
- trashed file:
$username."/files_encryption/keys/files_trashbin/files/".$filename.".d".$delete_timestamp."/OC_DEFAULT_MODULE/fileKey"
- trashed version file: trashed version files use the same location for the file key file as their trashed file
File type: file¶
Files contain the actual file content. The file content is encrypted and signed with a password and stored in a format that is specific to the Nextcloud encryption module.
File format¶
The file content is split into blocks of 6072 bytes. Each block is encrypted and Base64 encoded (denoted as $encryption[0..$n]
). For the encryption an initialization vector of 16 bytes is selected for each block (denoted as $iv[0..$n]
). Furthermore a hexadecimally encoded message authentication code of 64 bytes is calculated of each block (denoted as $signature[0..$n]
). An encrypted block has a total size of 8192 bytes (8096 bytes for $encrypted[]
, 6 bytes for "00iv00"
, 16 bytes for $iv[]
, 7 bytes for "00sig00"
, 64 bytes for $signature[]
and 3 bytes for "xxx"
). Only the last encrypted block may be shorter. The header of the encrypted file is padded with 8147 bytes of "-"
(denoted as $padding
) to a total of 8192 bytes. The resulting file contains:
"HBEGIN:cipher:AES-256-CTR:keyFormat:hash:HEND".$padding.
$encrypted[0]."00iv00".$iv[0]."00sig00".$signature[0]."xxx".
$encrypted[1]."00iv00".$iv[1]."00sig00".$signature[1]."xxx".
$encrypted[2]."00iv00".$iv[2]."00sig00".$signature[2]."xxx".
[...]
$encrypted[$n]."00iv00".$iv[$n]."00sig00".$signature[$n]."xxx"
File locations¶
The locations of the files depend on the type of the encrypted file:
- regular file:
$username."/files/".$filename
- version file:
$username."/files_versions/".$filename.".v".$version_timestamp
- trashed file:
$username."/files_trashbin/files/".$filename.".d".$delete_timestamp
- trashed version file:
$username."/files_trashbin/versions/".$filename.".v".$version_timestamp.".d".$delete_timestamp
Key generation: generate the key pair¶
The key pair has to be generated with the openssl_pkey_new()
function. Then the private key and public key are extracted from the the key resource with the openssl_pkey_export()
function.
Key generation: store the public key¶
The public key is written to the $username.".publicKey"
file as documented in File type: public key file.
Key generation: store the private key¶
Derive the encryption key¶
The salt for the encryption key is derived by creating a raw SHA256 hash of $uid.$instanceId.$instanceSecret
with the hash()
function. $instanceId
can be retrieved as instanceid
from the config.php
. $instanceSecret
can be retrieved as secret
from the config.php
.
The encryption key is then derived by creating a raw SHA256-PBKDF2 hash of the password with the salt, 100.000 rounds and (by default) with a target size of 32 bytes (as required for AES-256-CTR) with the hash_hmac()
function (denoted as $passphrase
).
The used password depends on the key type:
- master private key: use
secret
from theconfig.php
- public sharing private key: use an empty password
- recovery private key: use the recovery password
- user private key: use the user password
Encrypt the private key¶
The initialization vector is generated as a random string of 16 bytes with the random_bytes()
function (denoted as $iv
). The private key is (by default) AES-256-CTR encrypted with the $iv
and the $passphrase
with the openssl_encrypt()
function and returned as Base64 encoded without zero-padding (denoted as $encrypted
).
Sign the private key¶
The message authentication key is derived by creating a raw SHA512 hash of $passphrase.$version.$position."a"
with the hash()
function.
$version
is always"0"
.$position
is always"0"
.
The signature is then derived by creating a hexadecimally encoded SHA256-HMAC of $encrypted
and the message authentication key with the hash_hmac()
function (denoted as $signature
).
Store the private key¶
The private key is written to the $username.".privateKey"
file with the derived $encrypted
, $iv
and $signature
as documented in File type: private key file.
Encryption: generate the file key¶
Generate the file key¶
The file key is generated as a random string of 32 bytes with the random_bytes()
function (denoted as $filekey
).
Read the public key¶
The public keys of the recipients are read from the $username.".publicKey"
files as documented in File type: public key file.
Encrypt/seal the file key¶
The file key is encrypted/sealed with the openssl_seal()
function with the public keys. This returns the encrypted file key and the encrypted envelope keys for the recipients.
Store the file key¶
The encrypted file key is stored in the "fileKey"
file as documented in File type: file key file.
Store the envelope keys¶
The encrypted envelope keys for the recipients are stored in the $username.".shareKey"
files as documented in File type: share key file.
Encryption: encrypt the file¶
Split the file¶
The file is split into 6072 bytes sized blocks. Only the last encrypted block may be shorter. Each block is referenced by its zero-based index within the file (denoted as $position
).
Encrypt the blocks¶
For each block the initialization vector is generated as a random string of 16 bytes with the random_bytes()
function (denoted as $iv[$position]
). The block is (by default) AES-256-CTR encrypted with the $iv[$position]
and the $filekey
with the openssl_encrypt()
function and returned as Base64 encoded without zero-padding (denoted as $encrypted[$position]
).
Sign the blocks¶
The message authentication key is derived by creating a raw SHA512 hash of $filekey.$version.$position."a"
with the hash()
function.
$version
is theencrypted
value that can be retrieved from theoc_filecache
table in the database and must not be zero. Take into account that a file in theoc_filecache
table is identified by itspath
value as well as itsstorage
value which references thenumeric_id
field in theoc_storages
table. Including$version
into the message authentication key prevents blocks from being swapped between different versions of the same file.$position
is the index of the current block starting at"0"
and is appended with"end"
for the last block of the file. Including$position
into the message authentication key prevents blocks from being swapped within the same file. Furthermore, adding"end"
to the message authentication key of the last block prevents file truncation attacks.
The signature is then derived by creating a hexadecimally encoded SHA256-HMAC of $encrypted[$position]
and the message authentication key with the hash_hmac()
function (denoted as $signature[$position]
).
Store the file¶
The encrypted file is written to the file with the derived $encrypted[0..$n]
, $iv[0..$n]
and $signature[0..$n]
as documented in File type: file.
Decryption: read the private key¶
Read the private key file¶
The private key is read from the $username.".privateKey"
file and the values $encrypted
, $iv
and $signature
are parsed as documented in File type: private key file.
Derive the decryption key¶
The salt for the decryption key is derived by creating a raw SHA256 hash of $uid.$instanceId.$instanceSecret
with the hash()
function. $instanceId
can be retrieved as instanceid
from the config.php
. $instanceSecret
can be retrieved as secret
from the config.php
.
The decryption key is then derived by creating a raw SHA256-PBKDF2 hash of the password with the salt, 100.000 rounds and (by default) with a target size of 32 bytes (as required for AES-256-CTR) with the hash_hmac()
function (denoted as $passphrase
).
The used password depends on the key type:
- master private key: use
secret
from theconfig.php
- public sharing private key: use an empty password
- recovery private key: use the recovery password
- user private key: use the user password
Check the signature¶
The message authentication key is derived by creating a raw SHA512 hash of $passphrase.$version.$position."a"
with the hash()
function.
$version
is always"0"
.$position
is always"0"
.
The signature is then derived by creating a hexadecimally encoded SHA256-HMAC of $encrypted
and the message authentication key with the hash_hmac()
function. Only proceed when the derived signature is equal to $signature which is checked with the hash_equals()
function.
Decrypt the private key¶
The private key is (by default) AES-256-CTR decrypted with the $iv
and the $passphrase
with the openssl_decrypt()
function.
Decryption: read the file key¶
Read the file key¶
The encrypted file key is read from the "fileKey"
file as documented in File type: file key file.
Read the envelope key¶
The encrypted envelope key for the recipient is read from the $username.".shareKey"
file as documented in File type: share key file.
Decrypt/unseal the file key¶
The encrypted file key is decrypted/unsealed with the openssl_open()
function with the private key and encrypted envelope key for the recipient (denoted as $filekey
).
Decryption: decrypt the file¶
Split the file¶
The encrypted file is split into a 8192 bytes sized header and one or more 8192 bytes sized blocks. Only the last encrypted block may be shorter. Each block is referenced by its zero-based index within the file (denoted as $position
). The values $encrypted[0..$n]
, $iv[0..$n]
and $signature[0..$n]
are parsed as documented in File type: file.
Check the block signatures¶
The message authentication key is derived by creating a raw SHA512 hash of $filekey.$version.$position."a"
with the hash()
function.
$version
is theencrypted
value that can be retrieved from theoc_filecache
table in the database and must not be zero. Take into account that a file in theoc_filecache
table is identified by itspath
value as well as itsstorage
value which references thenumeric_id
field in theoc_storages
table. Including$version
into the message authentication key prevents blocks from being swapped between different versions of the same file.$position
is the index of the current block starting at"0"
and is appended with"end"
for the last block of the file. Including$position
into the message authentication key prevents blocks from being swapped within the same file. Furthermore, adding"end"
to the message authentication key of the last block prevents file truncation attacks.
The signature is then derived by creating a hexadecimally encoded SHA256-HMAC of $encrypted[$position]
and the message authentication key with the hash_hmac()
function. Only proceed when the derived signature is equal to $signature[$position]
which is checked with the hash_equals()
function.
Decrypt the blocks¶
Each block is (by default) AES-256-CTR decrypted with the $iv[$position]
and the $filekey
with the openssl_decrypt()
function.
Sources¶
- nextcloud-tools repository on GitHub
- Nextcloud Encryption Configuration documentation
- Nextcloud Help response concering the usage of version information
- Overview of ownCloud Encryption Model
- Sourcecode: Creation of the Message Authentication Code
- Sourcecode: Derivation of the Encryption Key
- Sourcecode: Encryption of the File
- Sourcecode: Encryption/Sealing of the File Key
- Sourcecode: Extraction of the Private and Public Key
- Sourcecode: Generation of the File Key
- Sourcecode: Generation of the Initialization Vector
- Sourcecode: Generation of a Key Pair